hw4

.pdf

School

San Jose State University *

*We aren’t endorsed by this school

Course

166

Subject

Computer Science

Date

Apr 3, 2024

Type

pdf

Pages

1

Uploaded by klb2832

CS-166 Information Security Homework #4 Due: 12/7/2022, Wednesday, 11:59pm Except for the programming, please describe your answers in less than 10 sentences. Highlight your key points for each question. Please upload your soft copy (reports, codes) on the CANVAS by the due date. Please consult with your partners in your study or project group to solve homework assignments. However, note that you must write up your report yourself without any assistance. If you turn in the exact same report and same code as your friend, both of you will receive 0 points and be considered violating academic integrity. This homework covers Network Attacks. There is an accompanying lab document CS166 Scapy-based Network Att acks” that you need to refer to the lab exercise tasks. Total points 60 [Question 1] (20 points) TCP SYN Flooding Attacks (1) Explanation how the TCP SYN flood attack works. (2) Explanation how SYN cookies work to prevent denial-of-service effect from SYN flood attack. (3) Follow the lab document to launch TCP SYN flooding attacks by using Scapy. Explain the “tcp_syn.py” code by commenting each line. You need to show captured attack traffic by using Wireshark (or other packet capturing tools.). Basically, you need to follow the attached Scapy lab docs. [Question 2] (20 points) UPD Flooding Attacks (1) Explanation how the UPD attack works. (2) Follow the lab document to launch UDP flooding attacks by using Scapy. Explain the udp_flood .py” code by commenting each line. You need to show captured attack traffic by using Wireshark (or other packet capturing tools.). Basically, you need to follow the attached Scapy lab docs. [Question 3] (20 points) ICMP Flooding Attacks (1) Explanation how the ICMP attack works. (2) Follow the lab document to launch ICMP flooding attacks by using Scapy. Explain the “icmp_flood.py” code by commenting each line. You need to show captured attack traffic by using Wireshark (or other packet capturing tools.). Basically, you need to follow the attached Scapy lab docs.
Discover more documents: Sign up today!
Unlock a world of knowledge! Explore tailored content for a richer learning experience. Here's what you'll get:
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help